London, Finsbury Square, United Kingdom Hybrid / WFH Options
Morson Talent
Cybersecurity Vulnerability Lead - £700 per day - Inside IR35 - Remote - 6 Months initial contract. Our client, the UKs leading producer of Zero Carbon energy, is looking for a Cybersecurity Vulnerability Lead to join them on a contract basis. This is a senior role with responsibility for the organisation’s vulnerabilitymanagement programme across multiple business units, technologies … and regulatory environments. The organisation has made significant investment in Tenable as its core vulnerabilitymanagement platform. You’ll be expected to lead its strategic and day-to-day usage, ensuring vulnerabilities are accurately identified, prioritised, and remediated while driving continuous improvement in how the platform is integrated and utilised. Candidates with strong Tenable expertise, particularly those who … for SC clearance. Candidates with active or recently lapsed SC clearance will be prioritised. Applicants without clearance must be willing and eligible to undergo vetting. The Role - As Cybersecurity Vulnerability Lead, you will: Own the end-to-end vulnerabilitymanagement programme, with Tenable One at the core. Define and deliver the strategy, policies, SLAs, and operating rhythm. More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Experis
experts and consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity Experience and understanding of both the roles and interlock between enterprise & solution architecture Experience in both operational and transformation … cybersecurity roles or a clear working understanding of both perspectives Experience working in large-scale IT transformation programmes Identity & Access Management: Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault Experience of developing secrets management patterns and championing designs through architecture governance forums Experience of designing or implementing Workload Identity Frameworks within large More ❯
and governing foundational security controls within a global enterprise environment. You will act as a strategic advisor and technical authority, supporting the development and implementation of endpoint security practices, vulnerabilitymanagement, asset control, and governance-aligned with the organisation's broader 2026 security strategy . This is an ideal opportunity for someone who may not see themselves as … ensuring controls are robust, scalable, and fit for the future. Translate technical and business needs into actionable security architecture guidance. Support governance and process standardisation across shadow IT , asset management , and vulnerabilitymanagement . Drive cross-functional collaboration across architecture, engineering, and operational teams. Ideal Candidate Profile: Strong technical understanding of endpoint security , including hardening, tooling, and More ❯
Southampton, Hampshire, South East, United Kingdom
University of Southampton
Cisco technologies, to protect against evolving threats. What youll do - As part of a team of analysts, youll be responsible for the overall day-to-day technical and operational management of cyber and information security within the University. This includes operating within a hybrid Security Operations Centre (SOC) model, leading the investigation and resolution of cybersecurity incidents, and co … continuous monitoring across the University. - Conduct proactive threat hunting activities to detect advanced threats and anomalous behaviour within the University's network, and provide solutions to support incident response, vulnerabilitymanagement, and strategic security decisions. - Collaborate with third-party providers to scope, co-ordinate, and review network security assessments, and ensure that findings and recommendations are effectively prioritised … communicated, documented and implemented to improve the Universitys security posture. - Support the network vulnerabilitymanagement process by identifying, assessing, and prioritising security vulnerabilities, and working with relevant teams and third parties to ensure timely remediation through patching, configuration changes, or other appropriate fixes. - Design, implement, and support technical security controls to defend University network systems against security threats More ❯
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerabilitymanagement, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerabilitymanagement, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications More ❯
Vulnerability Analyst – 3-month contract My Customer is seeking a proactive and skilled Vulnerability Analyst to join their team in a highly regulated, mission-critical 24/7 environment. Their infrastructure includes over 450 servers operating across both Windows and Linux platforms — making secure access and timely response essential. Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools is needed for this role. Key Skills from the Vulnerability Analyst: Demonstrated experience in vulnerabilitymanagement within large-scale enterprise or corporate environments . Hands-on experience with Qualys and its vulnerability scanning, assessment, and reporting tools. Strong working knowledge of Windows and Linux operating systems , including their associated technology … stacks. Able to operate effectively in a secure, complex, and highly regulated setting with restricted access considerations. Key responsibilities for the Vulnerability Analyst: Daily monitoring and analysis of security events and vulnerabilities. Proactively reviewing Qualys reports to identify missing patches, misconfigurations, and other potential threats. Collaborating closely with infrastructure and operations teams to coordinate and apply remediation actions. Ensuring More ❯
Title: CREST Accredited Security Tester 6 Month Contract Hybrid (Central London based) £670 Per Day Inside IR35 Overview: Seeking a CREST-accredited Security Tester with strong penetration testing and vulnerabilitymanagement expertise. Skilled in Tenable Nessus and experienced in managing third-party testing engagements , you'll deliver high-impact security assurance across complex environments. Key Responsibilities: Conduct internal … clear, high-quality scopes, proposals, and technical reports . Provide SME guidance on threats, risks, and testing methodologies. Manage and coordinate third-party CHECK/CREST testers . Lead vulnerabilitymanagement activities, validating remediation. Contribute to testing frameworks, playbooks, and secure-by-design practices . Research and assess emerging threats to enhance testing capability. Skills & Experience: CREST certification More ❯
Worthing, West Sussex, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
Vulnerability Analyst – 6 Months – Remote - Qualys A client is seeking a Vulnerability analyst/Patching Engineer to help tackle a critical security backlog across 2,700 devices. This is a hands-on contract role focused on patching end users and security remediation to ensure systems are up to date and secure. Key Skills of the Vulnerability Analyst … Strong experience in vulnerabilitymanagement and patching within enterprise environments. Hands-on experience with Qualys for vulnerability scanning and reporting. Solid Windows 10/11 expertise with a focus on security hardening and patching. Proficient with SCCM is beneficial but not necessary. Excellent documentation skills. Strong verbal and written communication skills. Responsibilities of the Vulnerability Analyst … end patching for end user devices. Support and transfer knowledge of Qualys alerts and patching workflows. Ensure all systems run on the latest and most secure versions. The successful Vulnerability t Analyst will be working remotely however may require occasional ad hoc travel to Worthing. Apply now to speak with VIQU IT in confidence. Or reach out to Matt More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
requirements. Contribute to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large-scale IT transformation … programmes. Skilled in Identity & Access Management (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged access management, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication skills, with the ability to engage both technical and non-technical stakeholders. Preferred Qualifications More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Experis
Sheffield 3 days in the office is mandatory End Date: 30th November (renewal end of Nov) £567 Project Overview: The client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. One of the … pillars of that programme is Privileged Access Management (PAM). The client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead Security Solution Architect that can complement an existing team of Solution Architects to progress … the end-to-end journey. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud. Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Experience designing and securing AI/ML and MLOps environments , including awareness of risks such as adversarial attacks, model poisoning, and data privacy issues. Deep knowledge of: Identity & Access Management (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled in applying frameworks such as NIST … CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerabilitymanagement, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP, TOGAF, AWS/Azure/GCP security certifications). Excellent communication and leadership skills, with the ability to influence at all levels. Esther Urtecho Senior Delivery Consultant More ❯
and rationale which leads to any negatively impacting change Willingness and ability to work across information technology as a cybersecurity SME Ability to take a deputised role in programme management-related tasks where necessary Required Skills/Experience The ideal candidate will have the following: Significant experience and proven technical depth within one of the following domains of cybersecurity … security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response … clear working understanding of both perspectives Experience working in large-scale IT transformation programmes Experience of designing solutions using SM tools such as HashiCorp Vault Experience of developing secrets management patterns and championing designs through architecture governance forums Capable of defining secrets management strategy and influencing the future direction of secrets management within the bank Enabling identity More ❯
phase. Review any incidents created in the projects service now queue and involve the appropriate teams to help fix them. Stakeholder Engagement: Ability to forge strong relationship with change management, project management team members. Work with end users to fix any bugs post deployment of solutions. Essential Experience Proven experience working as security engineer on large scale programmes … experience deploying Data classification using Microsoft Purview for a large enterprise. Experience collaborating with the Security Operations Centre (SOC) to optimise security monitoring, response planning and execution. Understanding of vulnerabilitymanagement and threat landscape detection and remediation. Proven experience in being part of Disaster Recovery and Business continuity testing for critical applications. Ability to perform basic Active directory … administration tasks for project work such as user, group and Group policy updates. Essential Technical Skills & Qualifications Experience of the M365 security stack : Microsoft Purview, Microsoft Entra ID, Device management using Intune, Identity Governance. Cloud Security (Tenable, CyberArk, MDR,VPN) Knowledge of best practices and procedures related to Cyber Essentials, UK DPA/GDPR Desirable Experience Proficiency in configuring More ❯
security controls in lab-based environments used for R&D operations. Network Security - Implement and manage network segmentation, access controls (user/vendor), and secure wireless communication. Firewall Policy Management - Own and deliver Firewall policy; engage with Firewall change processes and tools (eg . Zscaler, Dynamic Edge Segmentation (DES). Incident Management - Serve as the lead contact for … OT-related incidents, ensuring rapid technical resolution. Device Management - Work closely with R&D and global teams to secure OT assets to internal standards. VulnerabilityManagement - Identify, assess, and prioritise vulnerabilities based on business risk. Patch Management - Coordinate with R&D lines and vendors to validate and deploy security updates for OT environments. Security Controls Deployment More ❯
governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role Familiarity with cybersecurity principles, especially around PEN Testing and vulnerabilitymanagement Strong communication skills with the ability to translate technical content for non … technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar) Additional Skills - Certifications like PMP, Prince2, or CISM/CISSP - Experience working with external PEN Testing vendors or consultancies - Ability to More ❯
governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role Familiarity with cybersecurity principles, especially around PEN Testing and vulnerabilitymanagement Strong communication skills with the ability to translate technical content for non … technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar) Additional Skills - Certifications like PMP, Prince2, or CISM/CISSP - Experience working with external PEN Testing vendors or consultancies - Ability to More ❯
IT Infrastructure Support Specialist - Systems & Patch Management Analyst We're seeking a detail-oriented and proactive Technical Infrastructure Analyst work an initial 3-month contract on our client's site in Suffolk. The candidate must therefore be a commutable distance Suffolk. This role is pivotal in maintaining the integrity, security, and performance of our client's enterprise systems. You … ll work closely with experienced Technical Analysts to apply patches, remediate vulnerabilities, and support life cycle management across both Windows and Linux environments. Key Responsibilities Patching & System Maintenance Install, configure, and maintain system software including operating systems and utilities. Apply security patches and updates in line with organisational policy and vendor guidance. Monitor patch compliance and report on remediation … progress. VulnerabilityManagement Investigate unauthorised access attempts and ensure compliance with relevant legislation. Collaborate with security teams to identify, assess, and remediate vulnerabilities. Support access control monitoring and incident response activities. Lifecycle & Infrastructure Operations Assist in the operation and control of IT infrastructure across hardware, software, and networks. Participate in change management processes for new or modified More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
role where youll play a key part in strengthening the organisations cyber defence posture by collecting, analysing, and disseminating actionable intelligence. Youll work closely with incident response, security operations, vulnerabilitymanagement, and leadership teams to anticipate threats, mitigate risks, and improve resilience. Key Responsibilities: Collect and analyse intelligence to address high-priority security requirements. Produce and share actionable More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Stackstudio Digital Ltd
to): Microsoft Defender for Endpoint Microsoft Defender for O365 Microsoft Defender for Identity Microsoft 365 Defender Microsoft Cloud App Security Good knowledge around Endpoint Detection and Response (EDR), Threat & VulnerabilityManagement (TVM), Attack Surface Reduction (ASR), and Auto Investigation and Remediation (AIR). Experience with Symantec Endpoint Protection (SEPM). Experience in McAfee/Windows Defender Antivirus Policy More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
background in delivery Security Assurance support, with the following skills and experience: Experience of producing Secure-By-Design assessments (Risk Assessment Papers, Risk Treatment Plan, Risk Business Case & Security Management Plan). Experience of implementing vulnerabilitymanagement processes. Experience of security assurance and the measurement of controls. Experience in risk and threat modelling within a high-threat More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
background in delivery Security Assurance support, with the following skills and experience: Experience of producing Secure-By-Design assessments (Risk Assessment Papers, Risk Treatment Plan, Risk Business Case & Security Management Plan). Experience of implementing vulnerabilitymanagement processes. Experience of security assurance and the measurement of controls. Experience in risk and threat modelling within a high-threat More ❯
in large-scale Financial Services organisations. Proven expertise in designing and implementing secure architectures within Azure public cloud solutions. Strong knowledge of securing Azure infrastructure, including identity and access management, network security, and data protection. Comprehensive understanding of security architecture frameworks and best practices (e.g., SABSA, TOGAF). Hands-on experience with security tools and processes, such as SIEM … vulnerabilitymanagement, and incident response within Azure environments. The ability to engage and communicate effectively with senior security stakeholders and technical security departments. Capability to engage with finance stakeholders to analyse and map business needs and processes. Experience in leading the development and implementation of business applications and financial solutions. A solid understanding of security architecture reviews and More ❯
no umbrella company admin fees) Requirements Extensive experience as an Enterprise or Security Architect in large-scale financial services organisationsDeep expertise in Azure security architecture, including identity and access management, network security, encryption, and data protectionStrong knowledge of secure application design and cloud migration (re-architect, re-platform, and re-factor models)Comprehensive understanding of enterprise security architecture frameworks … and best practices (e.g., SABSA, TOGAF)Hands-on experience with enterprise security controls and tooling - SIEM, vulnerabilitymanagement, incident response, IAM solutionsProven experience embedding security into architecture governance, SDLC, and acquisition/delivery processesSkilled in stakeholder engagement at senior levels, including finance and technology leadershipExperience advising, defining, and reviewing enterprise security architecture in cloud transformation programmesComfortable contributing to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Public Sectors. The Roles Involve: Incident Response : Enhance coordination, assess impact, inform guidance, and develop playbooks. Threat Intelligence : Deliver tailored intelligence, monitorTTPs, and manage tooling (OpenCTI, MISP, sandboxes). VulnerabilityManagement : Identify and triage vulnerabilities, support remediation, and improve disclosure schemes. Requirements : Proven experience in SOC environments and incident response. Deep understanding of threat actors and intelligence platforms. … Expertise in vulnerability scanning and remediation. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for More ❯